{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T07:10:30Z","timestamp":1770880230433,"version":"3.50.1"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T00:00:00Z","timestamp":1761523200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T00:00:00Z","timestamp":1761523200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,27]]},"DOI":"10.1109\/icves65691.2025.11376182","type":"proceedings-article","created":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T20:54:58Z","timestamp":1770843298000},"page":"437-444","source":"Crossref","is-referenced-by-count":0,"title":["An Approach to Formal Verification of Autonomous Vehicle Systems using Threat Analysis"],"prefix":"10.1109","author":[{"given":"Sheraz","family":"Mazhar","sequence":"first","affiliation":[{"name":"Coventry University,Centre for Future Transport and Cities,UK"}]},{"given":"Abdur","family":"Rakib","sequence":"additional","affiliation":[{"name":"Coventry University,Centre for Future Transport and Cities,UK"}]},{"given":"Robin","family":"Doss","sequence":"additional","affiliation":[{"name":"Deakin University,Deakin Cyber Research and Innovation Centre (Deakin Cyber),Geelong,VIC,Australia,3220"}]},{"given":"Adnan","family":"Anwar","sequence":"additional","affiliation":[{"name":"Coventry University,Centre for Future Transport and Cities,UK"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2024.100804"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3345543"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/AERO47225.2020.9172563"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM59352.2023.10327917"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-57249-4_3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103391"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/info14010014"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.22214\/ijraset.2024.58497"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-023-00769-w"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet59005.2023.10490042"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45657-0_29"},{"issue":"2","key":"ref12","first-page":"65","article-title":"Challenges Associated with the Deployment of Software Over-the-Air (SOTA) Updates in the Automotive Industry","volume":"8","author":"Ekatpure","year":"2023","journal-title":"Vectoral IJSICS"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30446-1_25"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3605943"},{"key":"ref15","article-title":"Verifying requirements for resource-bounded agents","volume-title":"Ph.D. dissertation","author":"Abdur","year":"2011"},{"key":"ref16","article-title":"Comprehensive experimental analyses of automotive attack surfaces","volume-title":"Proc. 20th USENIX Security Symp. (USENIX Security 11)","author":"Checkoway"}],"event":{"name":"2025 IEEE International Conference on Vehicular Electronics and Safety (ICVES)","location":"Coventry, United Kingdom","start":{"date-parts":[[2025,10,27]]},"end":{"date-parts":[[2025,10,28]]}},"container-title":["2025 IEEE International Conference on Vehicular Electronics and Safety (ICVES)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11373934\/11375868\/11376182.pdf?arnumber=11376182","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T06:28:09Z","timestamp":1770877689000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11376182\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,27]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icves65691.2025.11376182","relation":{},"subject":[],"published":{"date-parts":[[2025,10,27]]}}}